If you want a detailed security rating about your bargains.exe (and all other running background processes) download the free trial version of Security Task Manager.

Note: Any malware can be named anything - so you should check where the files of the running processes are located on your disk.
If a "non-Microsoft" .exe file is located in the C:\Windows or C:\Windows\System32 folder, then there is a high risk for a virus, spyware, trojan or worm infection!
Check it out!

Adware...will do nothing but slow down your PC and bring annoying Pop-ups

app

adware (google says)

mohhh09

bargains.exe is a spyware which generates pop-up advertisements and analyses your computer usage for analysis by Exact Advertising. This program is a registered security risk and should be removed immediately.

Mr T Godfrey

It crashes my internet connection because the file cannot be written. I can now only connect through Outlook.

mitchell

It is and adware program that shows annoying and dirty popups

J Kwon

this makes your pc slower

Fill The Whise

It will activeate randomly and take up ALL of your CPU power. Damn annoying when playing games and other stuff. Delete.

ladymcse

bargains.exe causes high CPU usage spikes which will temporarily halt your computer while you work. It appears to collect data from your computer. As I am unsure of exactly what data is being collected, security risks would include bank accounts, passwords and personal information.

Linda

It slows down the PC,starts Pop-Ups and I think it also starts the Bullseye Network, which can be very annoying, too.

Adware I close it and appears again.

Crapware

Ztsur

Ad

If you know more about bargains.exe, share your knowledge and help other users.

Security Rating:

What do you knowabout this file:

Link for more details:

Your Name:

More process information
Is bargains.exe spyware or a virus, trojans, adware or worm? Is there a known bargains.exe error?
Read more about bargains.exe on file.net.

An enhanced process viewer, that displays all the standard information as well as a unique security risk rating based on analysis of hidden functions (keylogging, stealth, browser surveillance, autorun entry,...)